首页 > 最新文献

2017 Fourth International Conference on Software Defined Systems (SDS)最新文献

英文 中文
Security-aware channel assignment in IoT-based cognitive radio networks for time-critical applications 时间关键应用中基于物联网的认知无线网络的安全感知信道分配
Pub Date : 2017-05-08 DOI: 10.1109/SDS.2017.7939139
H. Salameh, Sufyan Almajali, M. Ayyash, H. Elgala
Cognitive radio networks (CRNs) have a great potential in supporting time-critical data delivery among the Internet of Things (IoT) devices and for emerging applications such as smart cities. However, the unique characteristics of different technologies and shared radio operating environment can significantly impact network availability. Hence, in this paper, we study the channel assignment problem in time-critical IoT-based CRNs under proactive jamming attacks. Specifically, we propose a probabilistic spectrum assignment algorithm that aims at minimizing the packet invalidity ratio of each cognitive radio (CR) transmission subject to delay constrains. We exploit the statistical information of licensed users' activities, fading conditions, and jamming attacks over idle channels. Simulation results indicate that network performance can be significantly improved by using a security- availability- and quality-aware channel assignment that provides communicating CR pair with the most secured channel of the lowest invalidity ratio.
认知无线网络(crn)在支持物联网(IoT)设备之间的时间关键型数据传输以及智能城市等新兴应用方面具有巨大潜力。然而,不同技术的独特特性和共享的无线电操作环境会显著影响网络的可用性。因此,在本文中,我们研究了主动干扰攻击下基于时间临界物联网crn的信道分配问题。具体来说,我们提出了一种概率频谱分配算法,其目标是在时延约束下最小化每个认知无线电(CR)传输的数据包无效率。我们利用许可用户的活动、衰落条件和空闲信道上的干扰攻击的统计信息。仿真结果表明,采用安全可用性和质量敏感的信道分配方式,为通信CR对提供最低无效率的最安全信道,可以显著提高网络性能。
{"title":"Security-aware channel assignment in IoT-based cognitive radio networks for time-critical applications","authors":"H. Salameh, Sufyan Almajali, M. Ayyash, H. Elgala","doi":"10.1109/SDS.2017.7939139","DOIUrl":"https://doi.org/10.1109/SDS.2017.7939139","url":null,"abstract":"Cognitive radio networks (CRNs) have a great potential in supporting time-critical data delivery among the Internet of Things (IoT) devices and for emerging applications such as smart cities. However, the unique characteristics of different technologies and shared radio operating environment can significantly impact network availability. Hence, in this paper, we study the channel assignment problem in time-critical IoT-based CRNs under proactive jamming attacks. Specifically, we propose a probabilistic spectrum assignment algorithm that aims at minimizing the packet invalidity ratio of each cognitive radio (CR) transmission subject to delay constrains. We exploit the statistical information of licensed users' activities, fading conditions, and jamming attacks over idle channels. Simulation results indicate that network performance can be significantly improved by using a security- availability- and quality-aware channel assignment that provides communicating CR pair with the most secured channel of the lowest invalidity ratio.","PeriodicalId":326125,"journal":{"name":"2017 Fourth International Conference on Software Defined Systems (SDS)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124877598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 26
OSPF routing protocol performance in Software Defined Networks 软件定义网络中OSPF路由协议性能
Pub Date : 2017-05-08 DOI: 10.1109/SDS.2017.7939153
A. Rego, S. Sendra, J. M. Jiménez, Jaime Lloret
Software Defined networks (SDNs) paradigm tries to improve the network performance, facilitating the network management and the scalability basing on open-source software and adding a new entity called controller that manages the entire network. One of the goals of the controller is taking decisions in regards to routing instead of distributing it among the network nodes, as usual. However, this field inside SDN needs more work because it is not clearly defined how the traditional routing protocols will work over a SDN. Thus, in this paper, we analyze how a dynamic routing protocol as Open Shortest Path First (OSPF) works in a SDN. The study analyzes the stability of network through parameters as convergence time and round trip time (RTT) and the quality of service (QoS) when a video is streamed between end devices. The results have been compared with a traditional network in order to evaluate the similarity in terms of stability and performance. Results show that, despite the proposal uses an OSPF implementation that does not have a performance as good as the traditional solution in terms of convergence time, with the SDN proposed we get better performance in terms of Quality of Service.
软件定义网络(sdn)模式试图提高网络性能,促进基于开源软件的网络管理和可扩展性,并增加一个称为控制器的新实体来管理整个网络。控制器的目标之一是在路由方面做出决定,而不是像通常那样在网络节点之间分配路由。然而,SDN中的这个字段需要更多的工作,因为它没有明确定义传统路由协议如何在SDN上工作。因此,在本文中,我们分析了动态路由协议如开放最短路径优先(OSPF)如何在SDN中工作。本研究通过视频在终端设备间传输时的收敛时间、往返时间(RTT)和服务质量(QoS)等参数来分析网络的稳定性。将结果与传统网络进行了比较,以评估其在稳定性和性能方面的相似性。结果表明,尽管该方案使用OSPF实现,但在收敛时间方面不如传统方案,但在服务质量方面得到了更好的性能。
{"title":"OSPF routing protocol performance in Software Defined Networks","authors":"A. Rego, S. Sendra, J. M. Jiménez, Jaime Lloret","doi":"10.1109/SDS.2017.7939153","DOIUrl":"https://doi.org/10.1109/SDS.2017.7939153","url":null,"abstract":"Software Defined networks (SDNs) paradigm tries to improve the network performance, facilitating the network management and the scalability basing on open-source software and adding a new entity called controller that manages the entire network. One of the goals of the controller is taking decisions in regards to routing instead of distributing it among the network nodes, as usual. However, this field inside SDN needs more work because it is not clearly defined how the traditional routing protocols will work over a SDN. Thus, in this paper, we analyze how a dynamic routing protocol as Open Shortest Path First (OSPF) works in a SDN. The study analyzes the stability of network through parameters as convergence time and round trip time (RTT) and the quality of service (QoS) when a video is streamed between end devices. The results have been compared with a traditional network in order to evaluate the similarity in terms of stability and performance. Results show that, despite the proposal uses an OSPF implementation that does not have a performance as good as the traditional solution in terms of convergence time, with the SDN proposed we get better performance in terms of Quality of Service.","PeriodicalId":326125,"journal":{"name":"2017 Fourth International Conference on Software Defined Systems (SDS)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114937636","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Security analysis as software-defined security for SDN environment SDN环境下软件定义的安全分析
Pub Date : 2017-05-08 DOI: 10.1109/SDS.2017.7939146
Nadya el Moussaid, A. Toumanari, Maryam el Azhari
The security of cloud environment is always a target for attackers in order to exploit any of the system's vulnerabilities. Recently, software-defined systems (SDS) has become a focus of several researches. Where, SDS is in the way to replace the traditional networking, in order to provide facilities which are based on remote and centralized control. The security of SDS is a major requirement to guarantee the integrity, confidentiality and availability of data and the communication. This paper presents a security analysis as a software-defined security service that enforces the security within the SDN in the cloud environment. The security analysis is specified through the attack graph and alert correlation clustering, which aims to enhance the work of other security approaches such as IDS by giving a global view and hint about the security state of the environment, also by reducing the rate of false positive alerts.
云环境的安全性一直是攻击者的目标,目的是利用系统的任何漏洞。近年来,软件定义系统(SDS)已成为研究的热点。其中,SDS正在取代传统的网络,以提供基于远程和集中控制的设施。SDS的安全性是保证数据和通信的完整性、保密性和可用性的主要要求。本文将安全分析作为一种软件定义的安全服务,在云环境中加强SDN内的安全性。安全分析是通过攻击图和警报相关聚类来指定的,其目的是通过提供关于环境安全状态的全局视图和提示,以及通过降低误报警报的比率,来增强IDS等其他安全方法的工作。
{"title":"Security analysis as software-defined security for SDN environment","authors":"Nadya el Moussaid, A. Toumanari, Maryam el Azhari","doi":"10.1109/SDS.2017.7939146","DOIUrl":"https://doi.org/10.1109/SDS.2017.7939146","url":null,"abstract":"The security of cloud environment is always a target for attackers in order to exploit any of the system's vulnerabilities. Recently, software-defined systems (SDS) has become a focus of several researches. Where, SDS is in the way to replace the traditional networking, in order to provide facilities which are based on remote and centralized control. The security of SDS is a major requirement to guarantee the integrity, confidentiality and availability of data and the communication. This paper presents a security analysis as a software-defined security service that enforces the security within the SDN in the cloud environment. The security analysis is specified through the attack graph and alert correlation clustering, which aims to enhance the work of other security approaches such as IDS by giving a global view and hint about the security state of the environment, also by reducing the rate of false positive alerts.","PeriodicalId":326125,"journal":{"name":"2017 Fourth International Conference on Software Defined Systems (SDS)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132497067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 22
Automating Ethernet VPN deployment in SDN-based Data Centers 以太网VPN在sdn数据中心的自动化部署
Pub Date : 2017-05-08 DOI: 10.1109/SDS.2017.7939142
K. A. Noghani, C. H. Benet, A. Kassler, A. Marotta, Patrick Jestin, Vivek V. Srivastava
Layer 2 Virtual Private Network (L2VPN) is widely deployed in both service provider networks and enterprises. However, legacy L2VPN solutions have scalability limitations in the context of Data Center (DC) interconnection and networking which require new approaches that address the requirements of service providers for virtual private cloud services. Recently, Ethernet VPN (EVPN) has been proposed to address many of those concerns and vendors started to deploy EVPN based solutions in DC edge routers. However, manual configuration leads to a time-consuming, error-prone configuration and high operational costs. Automating the EVPN deployment from cloud platforms such as OpenStack enhances both the deployment and flexibility of EVPN Instances (EVIs). This paper proposes a Software Defined Network (SDN) based framework that automates the EVPN deployment and management inside SDN-based DCs using OpenStack and OpenDaylight (ODL). We implemented and extended several modules inside ODL controller to manage and interact with EVIs and an interface to OpenStack that allows the deployment and configuration of EVIs. We conclude with scalability analysis of our solution.
L2VPN (Layer 2 Virtual Private Network)被广泛应用于服务提供商网络和企业中。然而,传统L2VPN解决方案在数据中心(DC)互连和网络环境中具有可伸缩性限制,这需要新的方法来满足服务提供商对虚拟私有云服务的需求。最近,以太网VPN (EVPN)被提出来解决这些问题,供应商开始在数据中心边缘路由器中部署基于EVPN的解决方案。但是,手动配置会导致耗时且容易出错的配置和高昂的操作成本。通过OpenStack等云平台实现EVPN的自动化部署,增强了EVPN实例的部署能力和灵活性。本文提出了一个基于软件定义网络(SDN)的框架,该框架使用OpenStack和OpenDaylight (ODL)在基于SDN的数据中心内实现EVPN的自动化部署和管理。我们在ODL控制器中实现和扩展了几个模块,用于管理evi和与evi交互,并提供了一个OpenStack接口,允许evi的部署和配置。最后对我们的解决方案进行可伸缩性分析。
{"title":"Automating Ethernet VPN deployment in SDN-based Data Centers","authors":"K. A. Noghani, C. H. Benet, A. Kassler, A. Marotta, Patrick Jestin, Vivek V. Srivastava","doi":"10.1109/SDS.2017.7939142","DOIUrl":"https://doi.org/10.1109/SDS.2017.7939142","url":null,"abstract":"Layer 2 Virtual Private Network (L2VPN) is widely deployed in both service provider networks and enterprises. However, legacy L2VPN solutions have scalability limitations in the context of Data Center (DC) interconnection and networking which require new approaches that address the requirements of service providers for virtual private cloud services. Recently, Ethernet VPN (EVPN) has been proposed to address many of those concerns and vendors started to deploy EVPN based solutions in DC edge routers. However, manual configuration leads to a time-consuming, error-prone configuration and high operational costs. Automating the EVPN deployment from cloud platforms such as OpenStack enhances both the deployment and flexibility of EVPN Instances (EVIs). This paper proposes a Software Defined Network (SDN) based framework that automates the EVPN deployment and management inside SDN-based DCs using OpenStack and OpenDaylight (ODL). We implemented and extended several modules inside ODL controller to manage and interact with EVIs and an interface to OpenStack that allows the deployment and configuration of EVIs. We conclude with scalability analysis of our solution.","PeriodicalId":326125,"journal":{"name":"2017 Fourth International Conference on Software Defined Systems (SDS)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121229888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Keynote speech 1: The path to which the 5G takes us, from the atom to the direct communication between devices and machines 主题演讲1:5G带给我们的路径,从原子到设备与机器之间的直接通信
Pub Date : 2017-05-08 DOI: 10.1109/FMEC.2017.7946396
J. Monserrat
This keynote speech analyses the current positioning of vendors and operators concerning the mobile market and its evolution towards the 5G. The seminar will deal with the analysis of the Mobile World Congress 2017, focusing then in the 5G process and the last advances in 3GPP specifications. Special attention will be paid to the D2D and mmW communication topic and the last advances in the research conducted in Prof. Monserrat group.
本主题演讲分析了厂商和运营商对移动市场的当前定位及其向5G的演变。该研讨会将分析2017年世界移动通信大会,重点关注5G进程和3GPP规范的最新进展。将特别关注D2D和毫米波通信主题以及Monserrat教授小组研究的最新进展。
{"title":"Keynote speech 1: The path to which the 5G takes us, from the atom to the direct communication between devices and machines","authors":"J. Monserrat","doi":"10.1109/FMEC.2017.7946396","DOIUrl":"https://doi.org/10.1109/FMEC.2017.7946396","url":null,"abstract":"This keynote speech analyses the current positioning of vendors and operators concerning the mobile market and its evolution towards the 5G. The seminar will deal with the analysis of the Mobile World Congress 2017, focusing then in the 5G process and the last advances in 3GPP specifications. Special attention will be paid to the D2D and mmW communication topic and the last advances in the research conducted in Prof. Monserrat group.","PeriodicalId":326125,"journal":{"name":"2017 Fourth International Conference on Software Defined Systems (SDS)","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134349402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Software Defined architecture for Cyberphysical Systems 网络物理系统的软件定义体系结构
Pub Date : 2017-05-08 DOI: 10.1109/SDS.2017.7939141
Ala Darabseh, N. Freris
The explosive proliferation of smart devices and cloud computing has ushered the era of Cyberphysical Systems (CPS), a congruence of physical dynamical systems with the cyberspace. The success of deploying an Internet of Things (IoT) interconnecting billions of devices relies heavily upon making the right choices in revisiting traditional architectures for networked control and information processing. Inspired by the concept of Software Defined Systems (SDSys), we propose a control architecture for cyberphysical systems and discuss its advantages in terms of scalability, robustness, security, flexibility, and interoperability. The proposed architecture explicitly leverages the fact that agents possess computational units that may be used for in-network processing and decentralized control actions. We integrate a set of components such as sensors, actuators, access points and coordinators and specify the communication flow, the data flow, and the control flow in a programmable fashion. Control is spread over multiple layers (self-controllers, coordinators, local area controllers, and super-controllers) that form a hierarchy with added autonomy for distributed and decentralized actions. A middleware layer is integrated into the proposed design with several services and units to account for real-time operations in highly dynamic environments. We proceed to identify a wide range of potential vulnerabilities to cyberattacks at all levels, and propose solutions for effective resilience, detection and recovery. The proposed architecture aims at a holistic view with increased adaptability, where the controllers efficiently collaborate to quickly capture and respond to abnormal situations in a self-adjusting manner.
智能设备和云计算的爆炸性增长开创了网络物理系统(CPS)时代,这是物理动力系统与网络空间的一致性。成功部署连接数十亿设备的物联网(IoT)在很大程度上依赖于在重新审视网络控制和信息处理的传统架构时做出正确的选择。受软件定义系统(SDSys)概念的启发,我们提出了一种网络物理系统的控制体系结构,并讨论了其在可扩展性、鲁棒性、安全性、灵活性和互操作性方面的优势。所提出的体系结构明确地利用了代理拥有可用于网络内处理和分散控制操作的计算单元的事实。我们集成了一组组件,如传感器、执行器、接入点和协调器,并以可编程的方式指定通信流、数据流和控制流。控制分布在多个层(自我控制器、协调器、局部区域控制器和超级控制器)上,这些层形成了一个层次结构,为分布式和分散的操作增加了自主性。将中间件层集成到建议的设计中,其中包含几个服务和单元,以考虑高度动态环境中的实时操作。我们继续在各个层面上识别各种潜在的网络攻击漏洞,并提出有效的弹性、检测和恢复解决方案。所提出的体系结构旨在提高适应性的整体视图,其中控制器有效地协作,以自我调整的方式快速捕获和响应异常情况。
{"title":"A Software Defined architecture for Cyberphysical Systems","authors":"Ala Darabseh, N. Freris","doi":"10.1109/SDS.2017.7939141","DOIUrl":"https://doi.org/10.1109/SDS.2017.7939141","url":null,"abstract":"The explosive proliferation of smart devices and cloud computing has ushered the era of Cyberphysical Systems (CPS), a congruence of physical dynamical systems with the cyberspace. The success of deploying an Internet of Things (IoT) interconnecting billions of devices relies heavily upon making the right choices in revisiting traditional architectures for networked control and information processing. Inspired by the concept of Software Defined Systems (SDSys), we propose a control architecture for cyberphysical systems and discuss its advantages in terms of scalability, robustness, security, flexibility, and interoperability. The proposed architecture explicitly leverages the fact that agents possess computational units that may be used for in-network processing and decentralized control actions. We integrate a set of components such as sensors, actuators, access points and coordinators and specify the communication flow, the data flow, and the control flow in a programmable fashion. Control is spread over multiple layers (self-controllers, coordinators, local area controllers, and super-controllers) that form a hierarchy with added autonomy for distributed and decentralized actions. A middleware layer is integrated into the proposed design with several services and units to account for real-time operations in highly dynamic environments. We proceed to identify a wide range of potential vulnerabilities to cyberattacks at all levels, and propose solutions for effective resilience, detection and recovery. The proposed architecture aims at a holistic view with increased adaptability, where the controllers efficiently collaborate to quickly capture and respond to abnormal situations in a self-adjusting manner.","PeriodicalId":326125,"journal":{"name":"2017 Fourth International Conference on Software Defined Systems (SDS)","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125215446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
A routing scheme for Cognitive Radio networks with Self-Interference Suppression capabilities 一种具有自干扰抑制能力的认知无线网络路由方案
Pub Date : 2017-05-01 DOI: 10.1109/SDS.2017.7939135
Rawan F. El Khatib, H. Salameh
In this work, we investigate the routing and channel assignment problem in Self-Interference Suppression (SIS)-enabled CRNs, where FD communication is possible. Specifically, we propose a novel metric called “Path Capacity” that reflects the number of links that can be simultaneously activated across a given path while using the minimum possible spectrum resources. Accordingly, we develop a novel routing scheme that selects the best path along with the channel assignment such that the highest capacity is achieved. We analytically formulate the routing problem as a route selection and channel assignment optimization, with the objective of minimizing the required number of distinct channels for each CR source-destination pair. We show that the optimization problem is a Binary Quadratic Programming (BQP) problem, which is, in general, NP-hard. Accordingly, we present a sequential fixing procedure that provides a near-optimal solution. Simulation results are provided, which show that a careful routing and channel assignment in SIS-enabled CRNs can significantly improve network performance.
在这项工作中,我们研究了自干扰抑制(SIS)启用crn中的路由和信道分配问题,其中FD通信是可能的。具体来说,我们提出了一种称为“路径容量”的新度量,它反映了在使用最小可能的频谱资源的情况下,可以在给定路径上同时激活的链路数量。因此,我们开发了一种新的路由方案,该方案根据信道分配选择最佳路径,从而实现最高容量。我们将路由问题解析为路由选择和信道分配优化,其目标是最小化每个CR源-目的地对所需的不同信道数量。我们证明了优化问题是一个二元二次规划(BQP)问题,一般来说,它是np困难的。因此,我们提出了一个提供接近最优解的顺序固定过程。仿真结果表明,在启用sis的crn中,仔细的路由和信道分配可以显著提高网络性能。
{"title":"A routing scheme for Cognitive Radio networks with Self-Interference Suppression capabilities","authors":"Rawan F. El Khatib, H. Salameh","doi":"10.1109/SDS.2017.7939135","DOIUrl":"https://doi.org/10.1109/SDS.2017.7939135","url":null,"abstract":"In this work, we investigate the routing and channel assignment problem in Self-Interference Suppression (SIS)-enabled CRNs, where FD communication is possible. Specifically, we propose a novel metric called “Path Capacity” that reflects the number of links that can be simultaneously activated across a given path while using the minimum possible spectrum resources. Accordingly, we develop a novel routing scheme that selects the best path along with the channel assignment such that the highest capacity is achieved. We analytically formulate the routing problem as a route selection and channel assignment optimization, with the objective of minimizing the required number of distinct channels for each CR source-destination pair. We show that the optimization problem is a Binary Quadratic Programming (BQP) problem, which is, in general, NP-hard. Accordingly, we present a sequential fixing procedure that provides a near-optimal solution. Simulation results are provided, which show that a careful routing and channel assignment in SIS-enabled CRNs can significantly improve network performance.","PeriodicalId":326125,"journal":{"name":"2017 Fourth International Conference on Software Defined Systems (SDS)","volume":"76 10","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132679449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Mobility management based SDN-IPv6 Routing Header 基于SDN-IPv6路由头的移动性管理
Pub Date : 2017-05-01 DOI: 10.1109/SDS.2017.7939156
Mouad Idri
Mobile networks are moving into the 5G which is envisaged to face various complexity of network management caused by the intensifying data traffic demand, diverse wireless environments, and multiple service necessities. The requirements are strong to propose new network architecture aiming to meet heterogeneous services demands coming from various technologies such as LTE, WiFi and beyond. It is then challenging to tackle the mobility management and more specifically vertical handovers which aim to maintain ongoing session. As a proposed technology, Software-defined network (SDN) that permits network operators to easily introduce new services and to simplify network management. Adding to this, Distributed Mobility Management (DMM) which is emerging as a new trend to blueprint future mobile network architectures in order to overcome the centralized aspect of the current mobile network. Due to the foreseen domination of IPv6, a combined solution is discussed to simplify users' mobility and to assure the QoS of different applications. Based on SDN and DMM, IPv6 Routing Header will be the main suggested solution to guarantee mobility management in heterogeneous network.
移动网络正在向5G迈进,预计5G将面临日益加剧的数据流量需求、多样化的无线环境和多样化的业务需求所带来的各种网络管理复杂性。提出新的网络架构以满足来自LTE、WiFi等多种技术的异构业务需求的要求是非常强烈的。然后,解决移动性管理和更具体地说,旨在维持正在进行的会话的垂直移交是具有挑战性的。软件定义网络(SDN, Software-defined network)作为一种被提出的技术,允许网络运营商轻松引入新业务,简化网络管理。此外,分布式移动管理(DMM)正在成为未来移动网络架构蓝图的新趋势,以克服当前移动网络的集中化方面。由于预见到IPv6的主导地位,讨论了一种组合解决方案,以简化用户的移动性,并保证不同应用的QoS。在SDN和DMM的基础上,IPv6路由头将成为异构网络中保证移动性管理的主要解决方案。
{"title":"Mobility management based SDN-IPv6 Routing Header","authors":"Mouad Idri","doi":"10.1109/SDS.2017.7939156","DOIUrl":"https://doi.org/10.1109/SDS.2017.7939156","url":null,"abstract":"Mobile networks are moving into the 5G which is envisaged to face various complexity of network management caused by the intensifying data traffic demand, diverse wireless environments, and multiple service necessities. The requirements are strong to propose new network architecture aiming to meet heterogeneous services demands coming from various technologies such as LTE, WiFi and beyond. It is then challenging to tackle the mobility management and more specifically vertical handovers which aim to maintain ongoing session. As a proposed technology, Software-defined network (SDN) that permits network operators to easily introduce new services and to simplify network management. Adding to this, Distributed Mobility Management (DMM) which is emerging as a new trend to blueprint future mobile network architectures in order to overcome the centralized aspect of the current mobile network. Due to the foreseen domination of IPv6, a combined solution is discussed to simplify users' mobility and to assure the QoS of different applications. Based on SDN and DMM, IPv6 Routing Header will be the main suggested solution to guarantee mobility management in heterogeneous network.","PeriodicalId":326125,"journal":{"name":"2017 Fourth International Conference on Software Defined Systems (SDS)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128660175","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Using Attribute-Based Access Control for Remote Healthcare Monitoring 在远程医疗监控中使用基于属性的访问控制
Pub Date : 2017-05-01 DOI: 10.1109/SDS.2017.7939154
I. Ray, Bithin Alangot, Shilpa Nair, K. Achuthan
Remote Healthcare Monitoring (RHM) IoT infrastructure uses sensors and smartphones to collect vital parameters from patients. These parameters pertaining to medical records are shared with healthcare professionals at geographically distant locations to provide timely medical care. RHM applications deployed on IoT infrastructure must address the issues of security and privacy in a constrained environment. We present our H-Plane framework for RHM and propose the use of the NIST Next Generation Access Control (NGAC) framework for specifying and enforcing access control policies.
远程医疗监控(RHM)物联网基础设施使用传感器和智能手机从患者那里收集重要参数。与医疗记录相关的这些参数与地理位置较远的医疗保健专业人员共享,以提供及时的医疗护理。部署在物联网基础设施上的RHM应用程序必须解决受限环境中的安全和隐私问题。我们提出了RHM的h平面框架,并建议使用NIST下一代访问控制(NGAC)框架来指定和执行访问控制策略。
{"title":"Using Attribute-Based Access Control for Remote Healthcare Monitoring","authors":"I. Ray, Bithin Alangot, Shilpa Nair, K. Achuthan","doi":"10.1109/SDS.2017.7939154","DOIUrl":"https://doi.org/10.1109/SDS.2017.7939154","url":null,"abstract":"Remote Healthcare Monitoring (RHM) IoT infrastructure uses sensors and smartphones to collect vital parameters from patients. These parameters pertaining to medical records are shared with healthcare professionals at geographically distant locations to provide timely medical care. RHM applications deployed on IoT infrastructure must address the issues of security and privacy in a constrained environment. We present our H-Plane framework for RHM and propose the use of the NIST Next Generation Access Control (NGAC) framework for specifying and enforcing access control policies.","PeriodicalId":326125,"journal":{"name":"2017 Fourth International Conference on Software Defined Systems (SDS)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127198041","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Mitigating anti-forensics in the Cloud via resource-based privacy preserving activity attribution 通过基于资源的隐私保护活动归属来减轻云中的反取证
Pub Date : 2017-05-01 DOI: 10.1109/SDS.2017.7939155
A. Odebade, T. Welsh, Siyakha N. Mthunzi, E. Benkhelifa
The multi-tenant Cloud environment creates a plethora of both technical and legal difficulties for digital forensics. Digital forensics typically relies on the analysis of evidence images or residual data. Due to the distributed nature of cloud environments can cause the required dataset to scale rapidly. When coupled with diversely heterogeneous environments, the widespread uptake of anti-forensic data and encryption, privacy requirements and a non-standardised architecture across Cloud Service Providers (CSPs), attribution of any activity for a forensic investigation becomes a tedious task. This paper presents an architecture agnostic, privacy-preserving solution to reducing the digital forensics target search space of a investigation within cloud and edge computing environments which will leverage standard metering and network logs for efficient activity attribution.
多租户云环境为数字取证带来了大量技术和法律上的困难。数字取证通常依赖于对证据图像或残留数据的分析。由于云环境的分布式特性可能导致所需的数据集快速扩展。再加上不同的异构环境、反取证数据和加密的广泛采用、隐私要求和跨云服务提供商(csp)的非标准化架构,取证调查的任何活动归属都成为一项繁琐的任务。本文提出了一种与架构无关、保护隐私的解决方案,用于减少云和边缘计算环境中调查的数字取证目标搜索空间,该解决方案将利用标准计量和网络日志来有效地进行活动归因。
{"title":"Mitigating anti-forensics in the Cloud via resource-based privacy preserving activity attribution","authors":"A. Odebade, T. Welsh, Siyakha N. Mthunzi, E. Benkhelifa","doi":"10.1109/SDS.2017.7939155","DOIUrl":"https://doi.org/10.1109/SDS.2017.7939155","url":null,"abstract":"The multi-tenant Cloud environment creates a plethora of both technical and legal difficulties for digital forensics. Digital forensics typically relies on the analysis of evidence images or residual data. Due to the distributed nature of cloud environments can cause the required dataset to scale rapidly. When coupled with diversely heterogeneous environments, the widespread uptake of anti-forensic data and encryption, privacy requirements and a non-standardised architecture across Cloud Service Providers (CSPs), attribution of any activity for a forensic investigation becomes a tedious task. This paper presents an architecture agnostic, privacy-preserving solution to reducing the digital forensics target search space of a investigation within cloud and edge computing environments which will leverage standard metering and network logs for efficient activity attribution.","PeriodicalId":326125,"journal":{"name":"2017 Fourth International Conference on Software Defined Systems (SDS)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2017-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123006130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
期刊
2017 Fourth International Conference on Software Defined Systems (SDS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1